Demo: Traffic Splitting for Tor – A Defense against Fingerprinting Attacks

Sebastian Reuter, Jens Hiller, Jan Pennekamp, Andriy Panchenko, Klaus Wehrle


Website fingerprinting (WFP) attacks on the anonymity network Tor have become ever more effective. Furthermore, research discovered that proposed defenses are insufficient or cause high overhead. In previous work, we presented a new WFP defense for Tor that incorporates multipath transmissions to repel malicious Tor nodes from conducting WFP attacks. In this demo, we showcase the operation of our traffic splitting defense by visually illustrating the underlying Tor multipath transmission using LED-equipped Raspberry Pis.

Full Text:




Hosted By Universitätsbibliothek TU Berlin.